ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
https://journal.asu.ru/ptzi
<p><strong>ISSN 2658-3240 (Print)</strong></p> <p><strong>ЖУРНАЛ «Проблемы правовой и технической защиты информации»</strong></p> <p><strong>ЖУРНАЛ </strong> «Проблемы правовой и технической защиты информации» публикует научные статьи, в которых рассматриваются актуальные проблемы обеспечения информационной безопасности в Российской Федерации и за рубежом, обсуждаются юридические аспекты борьбы с преступлениями в сфере компьютерной информации, исследуются вопросы разработки и применения программно-аппаратных и технических средств защиты информации.</p>Алтайский государственный университетru-RUПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ2658-3240BRICS INTERNATIONAL ROUND TABLE «DIGITAL SOCIETY: TRENDS, OPPORTUNITIES, RISKS» AT ALTAI STATE UNIVERSITY
https://journal.asu.ru/ptzi/article/view/16401
<p>The article presents the results of the BRICS International Round Table held at Altai State University, dedicated to the problems of developing a modern society in the context of digitalization. The participants' reports and the materials of the round table reflected the risks and threats associated with the development of such unfavorable trends as the rapid growth of cybercrime and its transformation into a transnational phenomenon. Specific proposals aimed at neutralizing negative phenomena and preventing transnational cybercrime were discussed.</p>Victor V. PolyakovRoman I. Raikin
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-282024-11-2812710ON SOME PROBLEMS OF QUALIFICATION AND PROOF OF DRUG SMUGGLING COMMITTED USING THE INTERNET (BASED ON EXAMPLES OF RUSSIAN LAW ENFORCEMENT PRACTICE)
https://journal.asu.ru/ptzi/article/view/15779
<p>The urgency of the fight against drug smuggling is due to the need to ensure the national security of the Russian Federation, as well as other BRICS member countries. The consolidation of efforts at the international level to combat these crimes should be preceded by a generalization of the national experience of each State. The crimes provided for in Article 229.1 of the Criminal Code of the Russian Federation are latent. It is recognized at the state level that the main reason for this is the use of information and telecommunication networks for their commission. A similar point of view is shared by legal scholars who study the problems of countering these illegal acts. An analysis of the few judicial practices in criminal cases of crimes provided for in Article 229.1 of the Criminal Code of the Russian Federation has revealed some problems of their investigation. In the case when operational investigative measures were not carried out on the fact of drug smuggling, proving the event of a crime presents significant difficulties. In a situation where evidence is obtained using the results of operational investigative activities, there is a risk of their exclusion due to violations committed during the production of operational investigative measures. If operational investigative activities are carried out only on the territory of Russia without joining forces with law enforcement agencies of foreign countries, then in most cases it is possible to identify the recipients of contraband and stop their illegal activities. The identities of the foreign accomplices remain unidentified. This entails difficulties in imputing the qualifying attribute provided for in paragraph "a" of Part 4 of Article 229.1 of the Criminal Code of the Russian Federation. In Russian practice, there are positive examples of suppressing the illegal activities of an international criminal community engaged in drug smuggling, as a result of successful interaction between employees of operational units of several States. In Russia, criminal cases of crimes provided for in Part 4 of Article 229.1 of the Criminal Code of the Russian Federation may be considered by a court with the participation of jurors. At the stage of pre-trial proceedings, there is a specificity of the investigation of such crimes. According to the results of the study, it is noted that comprehensive measures implemented at the domestic and international levels could contribute to improving the effectiveness of the fight against drug smuggling.</p>Elena G. Bykova
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-272024-11-27121119PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURE OF AN EDUCATIONAL ORGANIZATION
https://journal.asu.ru/ptzi/article/view/15764
<p>The article proposes technical and software tools to protect an educational organization from current threats to information security. It is shown that the effective use of information security tools depends on the architecture of the data transmission network and the information services used. To protect the organization's network from external attacks, it is proposed to use a firewall with advanced content filtering functions and a built-in streaming antivirus. This use of equipment made it possible to block malware on the perimeter of the local network before reaching employee workstations. Ensuring protection from the exploitation of vulnerabilities in the software of computers and servers was carried out through advanced monitoring of the operation of network devices and the implementation of antivirus protection. The results of the work can be used to protect critical information infrastructure facilities of educational institutions.</p>Александр Александрович Дмитриев
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-272024-11-27122024POSSIBILITIES OF INTERNATIONAL COOPERATION IN CONDUCTING SCIENTIFIC RESEARCH ON TRANSNATIONAL CYBERCRIME
https://journal.asu.ru/ptzi/article/view/15770
<p>The article notes the importance of international cooperation in countering transnational cybercrime, which is considered as a global international problem. Accordingly, the idea is expressed that scientific and methodological support for activities to detect, suppress, investigate and prevent transnational cybercrime is a global scientific problem that requires the combined efforts of scientists from different countries. It is noted that the most promising is the interaction of scientists from countries cooperating within the framework of various political, socio-economic organizations. Such states, in particular, are the BRICS member countries. Strengthening socio-economic ties between these countries will undoubtedly cause not only positive activity in the field of trade, production, education, culture and other spheres of life. There is no doubt that representatives of the criminal contingent will also try to use the strengthening cooperation to intensify and expand criminal activity in the territories of the interacting states participating in BRICS. In this regard, the problem of consolidating the efforts of the BRICS member states in improving the means, methods and techniques for solving and investigating transnational cybercrimes arises. The article notes that in these countries there is a different level of development, prevalence of digital tools, technologies, software products that can be used in committing transnational cybercrimes. The author suggests that the subjects of cybercrimes, representing different countries, differing in the level of education, experience and focus of criminal activity, prefer repetitive methods of encroachment. One of the main elements of such methods is the use, design of certain software to achieve the ultimate goal of the crime, conceal the nature of the actions performed. The content of this element in the actions of representatives of different countries differs significantly, which requires the use of specific means, methods and techniques of diagnostics, identification of the subjects of the crime. Representatives of different ethnic groups participating in the commission of a single crime form and use original means of communication. Recognition of the meaning of the information transmitted by such subjects also requires the use of non-standard techniques, methods and means. Generalization of the named and other signs of crimes of the type under consideration, construction of methods for solving and investigating such attacks will be more productive within the framework of international scientific cooperation.</p> Valery N. Karagodin
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-272024-11-27122530MODERN TRENDS IN THE DEVELOPMENT OF RUSSIAN CRIME, WHICH NECESSITATE THE TECHNICAL AND FORENSIC SUPPORT OF THE PROCESS OF PROVING CRIMINAL CASES
https://journal.asu.ru/ptzi/article/view/16402
<p>The article examines the issues of the concept, content and significance of the technical and forensic support of the process of proving criminal cases. It is said about the need for forensic support at all stages of criminal proceedings, starting from the stage of consideration of a crime report. The interrelation of all stages of criminal proceedings is shown as the basis of their unified forensic support. The modern trends in the development of crime in Russia are highlighted, which necessitate the intensification of the use of existing ones and the development and introduction of new technical means into investigative and judicial practice.</p> Andrey A. Korchagin
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-282024-11-28123138ON THE ISSUE OF DEVELOPING A FORENSIC ALGORITHM FOR THE INVESTIGATOR'S ACTIONS TO IDENTIFY THE PERSON WHO COMMITTED REMOTE FRAUD
https://journal.asu.ru/ptzi/article/view/16265
<p>The article presents a historical overview of the development of the doctrine of forensic algorithmization. The author, based on the analysis of judicial practice, identifies the main ways of committing remote fraud. The necessity of studying the method of remote fraud in the construction of a forensic algorithm is substantiated. It is proposed to classify the actions included in the developed forensic algorithms of the investigator's actions when identifying the person who committed remote fraud.</p>Andrey V. Kulaevsky
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-272024-11-27123942EXPERIENCE IN DEVELOPING TRAINING EVENTS AND DIGITAL SERVICES ON INFORMATION SECURITY
https://journal.asu.ru/ptzi/article/view/16170
<p>The article considers the problem of developing digital literacy in children in the context of the rapid growth of technology and the availability of Internet devices. It is noted that children often acquire basic digital literacy skills from their own experience, which can lead to the formation of unsafe patterns of behavior on the Internet. Particular attention is paid to the Concept of Information Security for Children, approved by the Government of the Russian Federation, which emphasizes the importance of educational work among children and their parents. To raise children's awareness of information security and digital literacy, various events are offered, such as reality quests, projects, trainings and extracurricular activities. The greatest interest among participants is in quest formats, where schoolchildren actively participate in practical exercises and simulations. Also mentioned are online projects, such as the socially-oriented platform "School of Cybersecurity" and the KidSafe application, which provide access to interactive tasks and tests to test knowledge. These events and projects are aimed at developing children's skills in the safe use of digital technologies, critical thinking and the ability to recognize and prevent cyber threats.</p>Pavel S. Ladygin Danil M. Fedoseenko
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-272024-11-27124347ON SOME ASPECTS OF ENSURING INFORMATION SECURITY AND COUNTERING TRANSNATIONAL CYBERCRIME IN THE MODERN WORLD
https://journal.asu.ru/ptzi/article/view/16109
<p>Proposals are being considered to improve the system of measures aimed at ensuring information security in the BRICS countries, the Russian Federation, as well as at the regional level. The measures designed to counteract transnational cybercrime and the use of cyberspace of the BRICS countries for criminal purposes are analyzed, and emerging threats to national security are noted. The role of scientific research in the implementation of these measures is considered separately, attention is drawn to the importance of developing cooperation between the BRICS countries.</p> Valery A. Mazurov
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-272024-11-27124851CHALLENGES TO DIGITAL SOCIETY: PROBLEMS OF TRAINING INFORMATION SECURITY SPECIALISTS
https://journal.asu.ru/ptzi/article/view/15983
<p>The paper discusses pressing problems and challenges to the modern digital society from the viewpoint of cybersecurity specialists and their professional activities. It is stated that cybersecurity specialists need an adequate level of the required specific professional competences to successfully overcome the noted problems and challenges. Therefore, such competences should be managed by the necessary study courses and modules in the cybersecurity and information security curricula of universities, colleges, and other institutions of higher education. A comparative analysis of cybersecurity curricula of several universities and colleges of BRICS countries (namely, Russia, China, and India) conducted in the paper reveals the lack of such study courses in the analyzed curricula. The paper concludes with several pivotal questions on prospective designs of the cybersecurity curricula that should help form and develop the required professional competences. This work was presented as a speaker paper at the International BRICS Roundtable «Digital Society: Trends, Opportunities & Risks», held on August 22, 2024, at the Altai State University, Barnaul, Russia.</p>Alexander V. Mansurov
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-272024-11-27125257TRANSNATIONAL ORGANIZED GROUPS WITH A NETWORK STRUCTURE AND ECOSYSTEMS OF TRANSNATIONAL CRIMINAL GROUPS
https://journal.asu.ru/ptzi/article/view/16403
<p>Thepaperconsidersnewforms of organization of transnationalcriminalgroupsspecializingin high-techcriminalattacks.Theprocesses of transformation of the structure of thesegroups are described,manifestedin the transitionfrom the traditionalhierarchicalstructureto the networkprinciples of interactionandmanagement. It is concluded that ecosystemsoforganizedgroupsandcriminalcommunities have been formedinrecentyears,unitingindividualcriminalgroupswithdifferentspecializationsthroughdigitalplatformson the conditions of preservingtheirautonomy.</p>Vitaly V. Polyakov
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-282024-11-28125861DIGITAL SUPPORT OF CRIMINAL PROCEEDINGS
https://journal.asu.ru/ptzi/article/view/16176
<p>On the basis of the provisions on digitalization laid down in the legal regulation of criminal proceedings, namely the Criminal Code of the Russian Federation, the Criminal Procedure Code of the Russian Federation and the Criminal Executive Code of the Russian Federation, problematic issues of the use of electronic resources, systems and databases, information and telecommunication networks, including the Internet, as well as the State Automated System are identified "Justice". By quoting these regulatory sources, especially Articles 474, 474.1 and 474.2 of the Criminal Procedure Code of the Russian Federation and Part 4 of Article 173 of the Criminal Executive Code of the Russian Federation, the promising, but almost unimplemented or not applied provisions of the law are clearly demonstrated. It is substantiated that, taking into account the above (cited) provisions of the law, it is necessary to work out and improve the concept of the use of electronic resources in criminal law sciences, eliminating the identified shortcomings, shortcomings and failures in work, more actively implement these provisions of the law in practice, possibly improving them (also at the legislative level), and, possibly, with the adoption of various additions (clarifications), as well as more actively use the system interdepartmental electronic interaction (SIEI).</p>Alexey Y. Safronov
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-272024-11-27126269ISSUES OF LEGAL PROTECTION OF INFORMATION WHEN FAMILIARIZING THE ACCUSED AND HIS DEFENDER WITH THE MATERIALS OF THE CRIMINAL CASE
https://journal.asu.ru/ptzi/article/view/16020
<p>The article examines the issues of legal protection of information when familiarizing the accused and his defender with the materials of the criminal case. The practice of allowing lawyers to photograph criminal cases in another way and copy any procedural documents using modern digital devices is criticized. Based on the study of international experience and analysis of the practice of the Constitutional Court of the Russian Federation, it is proposed to take a differentiated approach to the possibility of familiarizing the accused and his defender with the case materials, focusing on the preferential right to make extracts from it. The position of the Constitutional Court of the Russian Federation is given that restriction in familiarization with materials is possible in those cases that may contain information directly or indirectly related to a legally protected secret. According to the author, personal data protection considerations may also become the basis for a selective approach to allowing the defense party to get acquainted with certain case materials, the preliminary investigation of which has been completed. The article formulates methodological recommendations for investigators regarding the implementation of the right of relevant subjects to familiarize themselves with the case, including the removal of copies of procedural documents using technical means.</p>Mikhail A. Silnov
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-272024-11-27127076PSYCHOLOGICAL ASPECTS OF THE PERSONALITY OF AN EXTREMIST AND A TERRORIST WHO COMMITTED CRIMES ON THE INTERNET
https://journal.asu.ru/ptzi/article/view/16133
<p>In the article, the author examines some psychological aspects of the personality of an extremist and a terrorist who committed crimes on the Internet. In particular, the author pays attention to the moral and psychological characteristics of the criminal's personality, his family composition, gender characteristics, educational level and demographic characteristics. The attempt to determine the characteristics of the criminal's personality makes it possible to identify his predominant socio-demographic, criminal-legal and moral-psychological characteristics.</p>Alexander S. Sokolov
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-272024-11-27127282GENERAL, SPECIAL AND INDIVIDUAL MEASURES TO PREVENT THE COMMITMENT OF CRIMES ON THE INTERNET, PROVIDED FOR BY ARTICLE 205.2 OF THE CRIMINAL CODE OF THE RUSSIAN FEDERATION, BY STUDENTS OF EDUCATIONAL ORGANIZATIONS OF PROFESSIONAL AND HIGHER EDUCATION
https://journal.asu.ru/ptzi/article/view/15775
<p>The paper describes the results of the author's study of the determination complex of committing crimes provided for by Article 205.2 of the Criminal Code of the Russian Federation, including on the Internet, by students of educational organizations of professional and higher education. According to the information presented in the review of the National Center for Information Counteraction to Terrorism and Extremism in the Educational Environment and the Internet (hereinafter referred to as the NCTIC) for 2018-2023, acts falling under the elements of Article 205.2 of the Criminal Code of the Russian Federation are committed by persons aged 18-25. It should be noted that the dynamics of the commission of acts falling under Part 1 of Article 205.2 of the Russian Federation by representatives of this category has been decreasing over the period 2018-2023 and, conversely, the number of crimes specified by the Criminal Code committed by persons aged 30-49 is growing. Among persons committing crimes qualified under Part 2 of Article 205.2 of the Criminal Code of the Russian Federation, the opposite trend is observed: since 2018, a continuous increase in their commission by persons aged 18-25 has been noted. The same data is reflected in the judicial statistics under Article. 205.2 of the Criminal Code of the Russian Federation for 2018-2023. A set of general and special measures for preventing crimes of this category among students is defined. In conclusion, general mechanisms for individual work within the framework of criminological tools are indicated.</p>Maria A. Starodubtseva
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-272024-11-27128387ACTIVE DIRECTORY SECURITY ELEMENT RESEARCH: POSSIBLE ATTACKS
https://journal.asu.ru/ptzi/article/view/16404
<p>The paper discusses the research of Active Directory security elements such as passwords, hash functions, tickets and certificates. Each of the elements is presented from the point of view of its functioning within the domain infrastructure. Attack variants on the listed components are clearly shown, for a deeper understanding of how attackers operate within the corporate network and what methods of compromise they use.</p>Andrey E. Frolov Damir M. Nagaev
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-282024-11-28128893EFFICIENT DATA AUGMENTATION FOR TRAINING A VOICE VERIFICATION SYSTEM RESISTANT TO SPEECH DISTORTION
https://journal.asu.ru/ptzi/article/view/16015
<p>In this paper a new method of augmentation of speech data for effective training of voice verification systems was presented. It was based on expanding the set of audio signal transformations by adding a speech quality improvement method applied to distorted audio signals. This ensures that all the main ways of using modern verification systems were taken into account, both with and without preprocessing of the recorded speech signal. The proposed technique had been tested on VoxCeleb1 voice recordings, noise and pulse characteristics from the DNS Challenge 2023 set. FastResNet34 architecture was used as a neural network for testing the proposed technique. It was shown that training on an expanded augmented data set with artificially distorted and distortion-free speech samples gave a significant increase in the quality of verification in all major scenarios of using the model verification system.</p> Nikita A. ShvetsAndrey A. Lependin Valentin V. Karev
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-272024-11-271294102USING DEEPFAKES AS A MODERN WAY TO COMMIT CRIMES
https://journal.asu.ru/ptzi/article/view/15974
<p>The article is devoted to the problems associated with the rapid development of artificial intelligence technologies, in particular the use of deepfakes for criminal purposes. The author presents a certain list of crimes where deepfakes act as a means of committing them, since the main problem currently is the lack of awareness of citizens about the existence of such a method of committing a crime, which gives rise to faith in the content of the information received and new cases of fraud. An overview of the technology for deepfake detection is presented, trends and directions of its application are considered.</p>Natalia V. Shepel
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-272024-11-2712103106SOME PROBLEMS OF COUNTERING TRANSNATIONAL CYBERCRIME
https://journal.asu.ru/ptzi/article/view/16129
<p>The article deals with the issues of information and analytical support for countering transnational cybercrime using automated logical and analytical systems. The problems associated with the creation of an integrated data bank for operational investigative purposes and the organization of interdepartmental information interaction in the course of organizing counteraction to computer crimes are analyzed.</p>Евгений Яковец
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-272024-11-2712107115UNAUTHORIZED ACCESS TO COMPUTER INFORMATION: QUALIFICATION PROBLEMS
https://journal.asu.ru/ptzi/article/view/16078
<p>This scientific article raises the problematic issue of criminal law characteristics of the corpus delicti provided for in Article 272 of the Criminal Code of the Russian Federation (unlawful access to computer information). The problems of determining the subject of the crime, signs of the objective side of the corpus delicti provided for in Article 272 of the Criminal Code of the Russian Federation are raised. Taking into account the identified gaps in the current criminal legislation, it is proposed to amend the provisions of Article 272 of the Criminal Code of the Russian Federation. Examples from judicial and investigative practice are given.</p>Tamara V. Yakusheva Svyatoslav A. Gorovoy
Copyright (c) 2024 ПРОБЛЕМЫ ПРАВОВОЙ И ТЕХНИЧЕСКОЙ ЗАЩИТЫ ИНФОРМАЦИИ
2024-11-272024-11-2712116119